Authentication-based access control approach for enhancing security in pervasive computing environments

被引:0
|
作者
Gnaneshwari, G. R. [1 ]
Hema, M. S. [2 ]
Lingareddy, S. C. [1 ]
机构
[1] Sri Venkateshwara Coll Engn, Dept Comp Sci & Engn, Bangalore, Karnataka, India
[2] Anurag Univ, Dept Informat Technol, Hyderabad, India
关键词
Security; Pervasive computing (PC); Authentication; Access control; Wireless communication; PRIVACY-PRESERVING AUTHENTICATION; CONTROL SCHEME; EFFICIENT; MODEL;
D O I
10.1108/IJPCC-02-2021-0044
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment. Design/methodology/approach This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions. Findings The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario. Originality/value The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.
引用
收藏
页码:211 / 232
页数:22
相关论文
共 50 条
  • [1] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [2] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [3] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [4] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [5] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060
  • [6] The master key: A private authentication approach for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
  • [7] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [8] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [9] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [10] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157